Vous êtes sur la page 1sur 3

www.ijecs.

in
International Journal Of Engineering And Computer Science ISSN:2319-7242
Volume 4 Issue 6 June 2015, Page No. 12266-12268

Survey on security and privacy issues of Wireless Sensor Network


Seema Mane, Madhur Patrikar
Email:seemamane491@gmail.com
Department of Computer Engineering, Maharashtra Institute of Technology, Pune 411038, India
Email:mapatrikar@gmail.com
Department of Computer Engineering, Maharashtra Institute of Technology, Pune 411038, India

Abstract- Proliferation of Wireless sensor network is increased. Security, how to localized sensor between two nodes, efficient
authentication, privacy, scalability, flexibility and availability, these are main issues of wireless sensor network. Clustering based
wireless sensor network will solve the problem of security, privacy issues and scalability.
as communication delay, internal component delay,
difference of the clocks, and response delay between two
Keywords: wireless sensor network; clustering; jammer; vampire
attack wireless sensors based on that information. They identify
first to wireless sensors and then to renew the network node
I. INTRODUCTION
information. They proposed asynchronous ranging based
Security problem is one of the important issue for
device and used node identication algorithm for identifying
Wireless Sensor Network. The paper focuses on the security
malicious sensor nodes in the network and it is best suited to
and privacy issues of WSN applications. One of the most
the resilient clock synchronization scheme to the successful
needed and challenging components in a wireless sensor
detection rate of antinodes and ranging accuracy. [5]
network is how to localize sensor in the network.WSN is
type of computer network where in radio waves is used to When two nodes are communicated with each other
connect electronics devices with internet. WSN are broadly via router or any access media, then security can be
categorized into two types: static and dynamic depending on compromised. Eugene Y. Vasserman and Nicholas Hopper
the nature of the topology of network used in WSN. To explore resource depletion attacks at the routing protocol
discover the sensor positions in a secure and effective layer, which disable networks by using battery power. These
manner, node identication and distance estimation are types of attacks rely on the properties of classes of routing
needed. Availability is one of the issues of WSN. Vampire protocols. The protocol is used to detect vampire attacks
attacks are not depending on protocols, they are based on also. The quality of the protocol is depending on number of
general properties of protocol such as link, state, distance, nodes. To prevent from vampires they do not allowed
rout etc. backtracking to search the node [6].

Vampires use protocol-compliant messages, these attacks Yi-Shing Liou, Rung-Hung Gau and Chung-Ju
are difficult to detect and prevent also. Chang, proposed algorithms for medium access control in
wireless networks. The proposed algorithm takes the input
II. RELATED WORK
from information theoretic capacity area of a multiple access
Shih-Chang Lin and Chih-Yu Wen proposed a channel. According to the algorithms, a node is dynamically
device based ranging and node based identication scheme adjusted by using the previous strategies of other nodes and
to improve the reliability we should focused on how and the channel feedback. Transmission threshold and an
when to locate sensor between two nodes and how to aggression level are composedly used in the strategy.
provide security to the sensor networks. They analyzed Algorithm of symmetric learning for maximizing throughput
physical property of a device, different type of delays such and to maintain balance between throughput and fairness. A

Seema Mane, IJECS Volume 4 Issue 6 June, 2015 Page No.12266-12268 Page 12266
novel methods is used to properly choose a nite number of packet node header. This problem is solved by no-
available data on transmission rates [7]. backtracking algorithms and measuring the strength of the
attack by the ratio of network energy used in the benign case
The losses are caused by link errors only, the combined of
to the energy used in the malicious case. Safety from
link errors and malicious drop. Conventional algorithms
Vampire attacks implies this ratio is equal to 1.
which used detecting the packet loss rate cannot gives
3. Per-node energy usage under attacks: the carousel
satisfactory result for detection accuracy. The detection
attack causes excessive energy usage for a few nodes, since
accuracy is improved by a homomorphic linear authenticator
only nodes along a shorter path are affected. In contrast, the
(HLA). HLA used public auditing architecture and allows
stretch attack shows more uniform energy consumption for
the detector to verify the packet loss information send by
all nodes in the network, since longest route, causing more
nodes. To reduce the computation overhead of the baseline
nodes to process the packet. The carousel attack can be
scheme, a packet block based mechanism is used, which
prevented entirely by having forwarding nodes check source
allows one to trade detection accuracy for lower
routes for loops but this adds extra forwarding logic and
computation complexity. It gives better detection accuracy
thus more overhead. When a loop is detected, the source
than conventional methods such as a maximum-likelihood
route could be corrected and the packet sent on. A new class
based detection [2].
of resource consumption attacks that use routing protocols

Caching is to store parts of the mostly used content by users to permanently disable ad hoc wireless sensor networks by

in end users memory and its help to reduce peak data rates. depleting nodes battery power. These attacks do not depend
Considered the secure caching problem. The goal of on particular protocols or implementations, but rather

problem is to minimized leakage or information loss. It was expose vulnerabilities in a number of popular protocol

more secure for memory storage and in low cost, they classes. Depending on the location of the adversary, network

achieved good transmission rate. It is shown that the rate energy expenditure during the forwarding phase

achieved by the proposed caching scheme with secure increased.[2]

delivery is within a constant multiplicative factor from the


To identify malicious node, we require the detection to be
information-theoretic optimal rate for almost all parameter
performed by a public auditor. When a malicious node is
values of practical interest [3].
identied, the auditor should be able to construct a publicly

III. ISSUES AND METHODS OF WSN veriable proof of the misbehavior of that node. The
construction of such a proof should be privacy
1. Distribution scheme: A distributed scheme for secure preserving.[4]
ranging and node identication, applying the device
physical characteristics to locking the information, and the Radio jammer provides security to WSN. Jammer is a

response delay time, the DARNI (Device-based intelligent programmable device which disturb to the
Asynchronous Ranging and Node Identification) can be original waves.
used to detect misbehavior of anti-nodes. It solved anti-node
CONCLUSION
verication problem without changing any hardware and
software infrastructure and reliably provide a secure Survey based on WSN, APEA (accountable,
distance measurement system in wireless sensor. We should privacy-preserving and efficient authention) is efficient
require focusing on the methods to design energy efficient authentication framework, which achieves security, privacy,
message to improve like DARNI method. Clustering method accountability and high efficiency without the help of any
is best to reduced energy[5]. trusted third party for wireless access networks. Clustering
2. Prevantion from vampire attack: A Vampire attack based wireless sensor network will solve the problem of
on the composition and transmission of a message are security and privacy issues. Grid, hierarchy, linked cluster,
consumed more energy than the honest node change the double hierarchy cluster are different clustering methods.

Seema Mane, IJECS Volume 4 Issue 6 June, 2015 Page No.12266-12268 Page 12267
The clustering with use of jammer will be providing more
security to WSN.

REFERENCES

[1] Daojing He, Sammy Chan and Mohsen Guizani, An


Accountable, Privacy-preserving and Efcient Authentication
Framework for Wireless Access Networks, IEEE journal
Transactions on Vehicular Technology, DOI
10.1109/TVT.2015.2406671, 2015.
[2] Tao Shu and Marwan Krunz, Privacy-Preserving and Truthful
Detection of Packet Dropping Attacks in Wireless
Ad Hoc Networks, IEEE TRANSACTIONS ON MOBILE
COMPUTING, VOL. 14, NO. 4, pp-, 813-828, April 2015.
[3] Avik Sengupta and Ravi Tandon, Fundamental Limits of Caching
With Secure Delivery, IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY, VOL. 10, NO.
2,pp-355-370, February 2015.
[4] and T. Charles Clancy, Senior Member, IEEE
[5] Truc Thanh Tran and Hyung Yun Kong, CSI-Secured Orthogonal
Jamming Method for Wireless Physical Layer Security, IEEE
COMMUNICATIONS LETTERS, VOL. 18, NO. 5, pp-841-844,
MAY 2014.
[6] SHI LeyP, FU Wenjing, JIA Cong, LIU Xinl and IA Chunfu, A
Sensor Anonymity Enhancement Scheme Based on Pseudonym
for Clustered Wireless Sensor Network, IEEE Journal, China
Communications September 2014.
[7] Perumalraja Rengaraju, Chung-Horng Lung, Member, and Anand
Srinivasan, QoS-Aware Distributed Security Architecture for 4G
Multihop Wireless Networks, IEEE TRANSACTIONS ON
VEHICULAR TECHNOLOGY, VOL. 63, NO. 6, pp-2886-2900,
July 2014.
[8] Shih-Chang Lin and Chih-Yu Wen, Device-Based Asynchronous
Ranging and Node Identication for Wireless Sensor Networks ,
IEEE SENSORS JOURNAL, VOL. 14, NO. 10, pp-3648-3661,
October 2014.
[9] Yi-Shing Liou, Rung-Hung Gau and Chung-Ju Chang,
Dynamically Tuning Aggression Levels for
Capacity-Region-Aware Medium Access Control in
Wireless Networks, IEEE TRANSACTIONS ON WIRELESS
COMMUNICATIONS, VOL. 13, NO. 4, pp-1766-1778, April
2014.
[10] Eugene Y. Vasserman and Nicholas Hopper, Vampire Attacks:
Draining Life from Wireless Ad Hoc Sensor Networks, IEEE
TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 2,
pp-318-332, February 2013.
[11] D. J. Dechene, A. El Jardali, M. Luccini, and A. Sauer, A
Survey of Clustering Algorithms for Wireless Sensor Networks,
IEEE, 2010.

Seema Mane, IJECS Volume 4 Issue 6 June, 2015 Page No.12266-12268 Page 12268

Vous aimerez peut-être aussi